Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @0xddaa
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xddaa
-
New challenges release! :tada:https://twitter.com/pwnabletw/status/1220721445678067712 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ddaa proslijedio/la je Tweet
I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64. https://github.com/0xb0bb/pwndra pic.twitter.com/o1JPjyjgga
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ddaa proslijedio/la je Tweet
Remote iPhone Exploitation Part 2: Bringing Light into the Darkness -- a Remote ASLR Bypass https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-2.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ddaa proslijedio/la je Tweet
First #wasm security blogpost of 2020
Some people ask me, so here is how to start fuzzing #WebAssembly APIs of#browser JavaScript engines like Chrome/V8. In this blogpost, I'm using:
Dharma/Domato
Chrome/v8 ASan pre-built
Honggfuzz ;)https://webassembly-security.com/fuzzing-wasm-javascript-dharma-chrome-v8/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ddaa proslijedio/la je Tweet
At Google Project Zero, the team spends a *lot* of time discussing and evaluating vulnerability disclosure policies and their consequences. It's a complex and controversial topic! Here's P0's policy changes for 2020 (with our rationale for the changes): https://googleprojectzero.blogspot.com/2020/01/policy-and-disclosure-2020-edition.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
<非洲的動物上班族> 最後竟然正經了一回 XD 一個反差萌欸
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ddaa proslijedio/la je Tweet
Some of my exploits for BambooFox CTF ABW: https://gist.github.com/Charo-IT/c39db6f61bdfa11d2fe6533114022633 … APP I/II:https://gist.github.com/Charo-IT/a37c2e7311f2fb624897dbdad1759f60 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ddaa proslijedio/la je Tweet
Let's capture the fortune once again! Hope everyone enjoyed our hacker party. See you next year. Yohttps://youtu.be/hmueQQZ-VzU
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ddaa proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
The timeout makes exploits need more accurate. (I learned from Codeblue CTF. :p). LC↯BC may stay ahead until the game end if they find another arbitrary leak vuln.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
And the timeout of the program is 60 seconds. In other words, each round only has 5 chances to run the exploit and reduced to 2 chances after the scoreboard closed. In fact, LC↯BC only attacks 4 teams in each round in the last 3 hours.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
However, LC↯BC didn't attack all of the teams in each round. I guess the reason is that leak memory by calculating crc32 is easy to fail, but they must wait for the program to receive SIGALRM to trigger ROP be executed.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
LC↯BC finds 2 vulns (at least): stack bof and another bof when calculating crc32. No other teams replay the exploit successfully because ASLR will cause the result of crc32 to change.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
PPP finds 3 vulns: logic error, stack and heap bof, but they patch the binary with a small buffer size, it will cause SLA failed. :'(
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
About `hitcon ftp`: Six intended vulns, one of which is a logic error and allows teams to download the arbitrary files (every team was aware after pcap released), two of which can control RIP (stack and heap bof) and the last three can leak memory address.
#hitconctf#finalPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ddaa proslijedio/la je Tweet
New writeup, one of my favorite bugs
-
Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty
https://samcurry.net/filling-in-the-blanks-exploiting-null-byte-buffer-overflow-for-a-40000-bounty/ …
Featuring...
@d0nutptr@0xacb@Regala_@JLLiS@Yassineaboukir@plmaltaispic.twitter.com/RomLgdCcSC
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ddaa proslijedio/la je Tweet
Pwning VMWare, Part 1: RWCTF 2018 Station-Escapehttps://nafod.net/blog/2019/12/21/station-escape-vmware-pwn.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ddaa proslijedio/la je Tweet
[BLOG] A Deep Dive Into Samsung's TrustZone (Part 2) https://blog.quarkslab.com/a-deep-dive-into-samsungs-trustzone-part-2.html … by
@NeatMonster_,@patateQbool and@pandasec_Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ddaa proslijedio/la je Tweet
HITCON CTF Finals 2019
#Capture The Fortune This is the final result of HITCON CTF congratulations to Tea Deliverers, LC↯BC, TokyoWesterns ! And all the teams ! you are amazing ! What will we capture next year ? https://ctf.hitcon.org pic.twitter.com/iNGAb32Yk2
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ddaa proslijedio/la je Tweet
https://sandboxescaper.blogspot.com/2019/12/chasing-polar-bears-part-one.html … Here is part one. Pretty sure the attack surface described has many more bugs (not just the vmware tools installer.. I doubt this bug is exploitable in the first place, just wanted something to demo that is unpatched, easier for folks to learn!)
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.